By Land or by Sea

Floating ideas about surveillance cameras on boats, trains and trucks

Transportation security is a loaded term. There are so many different facets and subsets to transportation security -- such as mass transit, Department of Transportation surveillance and airport security -- and they all present their own challenges.

Port terminals in particular represent an interesting cross-section of environments, from waterfront activity to railway and trucking transport. A recent conversation with David Lindquist of Port Solution Integrators in North Carolina centered on some of the security and safety issues integrators typically face when deploying surveillance cameras in this setting.

From Lindquist’s viewpoint, port security encompasses three main areas: waterfront and shoreline surveillance, internal access and yard operations. With advancements in video analytics and infrared technology, and the recent introduction of thermal network cameras, more port operators are using video to secure perimeters, control access to property and equipment, and remotely monitor container movement to keep workers out of harm’s way.

Guarding Against Perimeter Breaches
The sheer vastness of ports makes them particularly challenging to protect. Integrators must build systems that guard against attempts to penetrate all areas along miles of perimeter fencing. End users also need to remain alert against trespassers in small watercraft using the cover of darkness to invade from the ocean side.

Though barbed and razor wire tend to discourage intruders, Lindquist often recommends that his clients link video cameras to smart fencing technology to improve detection and apprehension capabilities. If a person or object touches the fence, the system directs the cameras to pan and zoom to the location of the breach. At the same time, the system alerts officers to the situation so they can direct their attention to video streaming from those cameras and dispatch officers to investigate the event.

On the shoreline in particular, thermal network cameras with embedded analytics can separate the heat signature of water from other objects in the frame and trigger an alert if an anomalous heat signature is detected. As Lindquist points out, since lighting up the ocean is not an option, thermal cameras can serve as the front line guards to detect suspicious behavior. The superior detection capabilities of thermal technology greatly reduce false alarms when working with motion analytics.

Once motion is identified, infrared cameras can be directed to the location to provide greater image detail.

“In a typical port, one or two police officers are watching more than 200 cameras at any given time,” Lindquist said. “A person simply can’t process that many images simultaneously. So you need video intelligence to alert them as to where they need to focus their attention at any particular moment and provide valid data to help officers quickly formulate a reasonable response.”

Screening ID Badges
Since ports fall under the auspices of the Department of Homeland Security, every person entering the premises must either possess a federally issued TWIC access card or be escorted by someone who does. When this government photo ID is swiped at the entrance to the port, it triggers a database search to verify that the person is authorized to be on site.

Lindquist explained that it is important for ports to deploy video cameras at entrances to visually verify that the person who owns the TWIC card is actually the person swiping it through the card reader. Video analytics compare the camera image with the database image to ensure there is a match. If there is a discrepancy, the system sends an alert to officers to detain the individual in question.

“You want to avoid someone using another person’s TWIC card to get on site,” Lindquist said. “It might be something innocent, like asking someone to drop off building supplies at the port in their stead. But then again, it could be something more sinister like stealing an ID so you can smuggle in contraband or dangerous materials.”

While high-resolution cameras are particularly useful in verifying identities, instant notification is another valuable feature for internal security, especially since operators are monitoring cameras 24/7. Alarms draw their immediate attention to an incident in real time. Being able to quickly roll back the video to several minutes prior to an alarm also is critical, Lindquist said, since the incident might have been used merely as a diversion to pull attention away from the primary event or actual penetration point.

Protecting Workers from Hazards
Ports are bustling operations where huge containers are constantly being hoisted from one mode of transportation to another, on and off cargo ships, rail cars and commercial tractor trailers.

Because much of the operation is not automated, workers still dodge their way through lumbering yard equipment to manually capture container identification numbers, cargo bay location numbers and other information used to track shipments through the port. With the marriage of optical character recognition and high-resolution PTZ video cameras, however, port operators can remotely capture that information without leaving the operations center, thus minimizing their exposure to dangerous areas of the yard.

In Lindquist’s experience, ports are now looking into or starting to upgrade their infrastructure to extend throughout the yard, so the backbone is already in place to support network camera technology. Cameras can piggyback on the network, saving the port the cost and interruption of service required to string separate cable for video surveillance.

“This creates a whole new market space for integrators,” Lindquist said. “Worker safety is a big issue. If a camera gets crushed by a large vehicle, the dollar loss is small. If something should happen to a person instead, no amount of money could compensate for that.”

Making Port Security a Priority
The very nature of the environment makes protecting U.S. ports a technological challenge. Yet by intelligently marrying network video surveillance with other security systems, integrators can provide port authorities with effective ways to deter, detect and apprehend perpetrators before they can damage people and property or threaten our national security.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.